Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Digital Forensic Survival Podcasts
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
…
continue reading

1
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
1:13:33
1:13:33
Play later
Play later
Lists
Like
Liked
1:13:33Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
…
continue reading
…
continue reading

1
Inside the Mind of a CIA Agent: Nuclear Threats and Intelligence Operations
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56Send us a text PodMatch PodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: htt…
…
continue reading

1
Can Your Messaging Survive the Quantum Computing Threat?
52:41
52:41
Play later
Play later
Lists
Like
Liked
52:41Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation i…
…
continue reading
…
continue reading

1
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like lo…
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading

1
The SHOCKING Truth About AI Security in Hospitals
46:09
46:09
Play later
Play later
Lists
Like
Liked
46:09Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
…
continue reading
…
continue reading
…
continue reading

1
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an or…
…
continue reading

1
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Da…
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading
Send us a text PodMatch PodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Root.io Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no …
…
continue reading

1
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
…
continue reading
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
…
continue reading
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
…
continue reading

1
Browser Security Unveiled: John Carse on SquareX & Cyber Career Insights
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares: The Browser Security Gap: Why 85% of user time in browsers is a growing risk fo…
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
45:30
45:30
Play later
Play later
Lists
Like
Liked
45:30Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading